SAM Exam Chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

DO NOT

-Call a technician right away if your computer doesn't start -Turn off your router or modem before connecting to the Internet

DO

-Make sure the paper tray has paper before sending documents to print -Use compresses air to remove dust an d other particles from your keyboard -Check to see that your computer and devices are plugged in -Run the Optimize Drives feature to maximize free space on your hard drive

YES

-Screen resolution -Desktop theme -Desktop background

NO

-User account -Alert sound

process

A ____ is a program that runs in the background

search

A _____ utility finds files that meet criteria you specify, such as characters in a file name

defragmentation

A _____ utility recognizes the files on a hard disk so the OS accesses data more quickly

network

A server also called a(n) ____ operating system is a multiuser operating system because it controls a central computer that can support many users

disk cleanup

A____ utility finds and removes unnecessary files such as those stores in the Recycle Bin or Trash

file management

A____ utility provides an overview of your files and lets you rename, delete, move, and copy files and folders

Update

An operating system change that fixes bugs, improves security, or enhances features is called a(n)______

adware

Displays unsolicited advertisements in banners or pop-up windows

driver

Each device connected to a computer must have a ___

hurricanes and storms

Events that account for almost half of total catastrophic data losses

malware

Hackers create____ to intentionally damage computers by deleting files, erasing hard drives, Stalin g information, or slowing computer performance

Recycle bin

Not emptying this lets files remain on your computer and take up space

Trojan horse

Often used as keyloggers to steal passwords to online accounts, ____ disguise themselves as useful programs like utilities

Personal or desktop

Operating systems installed on a single computer are called ____ operating systems

platform

Operating systems software, also called a(n) ____, manages computer hardware and software

spooling

Placing data in a buffer so it can be retrieved later is called _____

Disk cleanup utility

Removes unused files like temporary Internet files from your hard drive

Disk Defragmenter

Reorganizes the data on a magnetic hard drive so that you can access files more quickly

Sleep or Hibernate

The ____ option stores the current state of open programs and documents and then uses low power instead of shutting down

Operating System

The _____ determines whether you can run two programs at the same time or connect your computer to a network

DOS, or Disk Operating System

The first personal computer operating system was named ___

Drag the border or corner of the window

To make a window larger or smaller

Point to the window's little bar, and then drag the window

To move a window

Click an icon on the Dock

To open a program in Mac OS X

Click the window's Minimize button

To reduce a window to a button on the taskbar

Click the window's Restore Down button

To return a maximized window to its original size

Black Hat

Type of hacker who intends serious harm through espionage, theft, or disruption of a network

White Hat

Type of hacker who wants to show off their skills and doesn't intend any serious damage

uninterruptible

Type of power supply/battery backup device that can prevent some forms of data loss

multipurpose

UNIX is called a(n) ___ operating system because it can run on a desktop PC or a server

device drivers

Unlike application software programs, which run in a window on your desktop, ____ usually run in the background whenever they're needed

file compression

Use a ____ utility to reduce the size of a file so it takes up less storage space on a disk

Cyberterrorism

Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people

Plug and Play

When you connect a new hardware device to your computer, the operating system uses a feature called____ so you can use the new hardware immediately

utility

Widgets or gadgets are ____ programs that appear on the desktops and display little pieces of information such as a calendar

Version 3.1

Windows did not become popular until ___________ was released in 1992

mobile

a(n) ____ operating system has features similar to a desktop operating system, but is simpler and significantly smaller

embedded

electronic devices such as card readers use ____ operating systems

disk cleanup

to delete unnecessary files on a hard disk use ________ software


Ensembles d'études connexes

Day 5 - Time Complexity, Stack, and Queue

View Set

Архитектура компьютера

View Set

Sociology test 4 final, fall 2015

View Set

AP Calculus AB Cumulative review

View Set

FIN 301 Chapter 5 HW/Test Questions

View Set

Gender Studies Exam (Readings *theses)

View Set

Financial Leverage and Capital Structure Policy 1

View Set

Functions in Python: Gaining a Deeper Understanding of Python Functions

View Set